Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Powered Tate Pairing Computation., and . IACR Cryptology ePrint Archive, (2005)Powered Tate Pairing Computation., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 338-341 (2008)A New Forward Secure Signature Scheme., , and . IACR Cryptology ePrint Archive, (2004)Cryptanalysis of Some Group-Oriented Proxy Signature Schemes., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 10-24. Springer, (2005)Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006., and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 686-691. Springer, (2007)An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems., , , , , , , , , and 1 other author(s). IEEE Access, (2024)A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis., , , , , and . IACR Cryptol. ePrint Arch., (2024)Efficient Delegation of Pairing Computation., , and . IACR Cryptology ePrint Archive, (2005)CAMEO - camera, audio and motion with emotion orchestration for immersive cinematography., and . Advances in Computer Entertainment Technology, volume 352 of ACM International Conference Proceeding Series, page 115-118. ACM, (2008)A statistical verification method of random permutations for hiding countermeasure against side-channel attacks., , , , , and . J. Inf. Secur. Appl., (2024)